General
-
Target
anti-anti-afk.exe
-
Size
1.6MB
-
Sample
250413-dv47yaxzfv
-
MD5
65aa3c881c733d7dddb867f4df56c316
-
SHA1
568313bc4a3eaba39da891becee3b752cec87337
-
SHA256
02d23f91859aa28a823d9b082129137836289a5bb11bae498689515a22072b16
-
SHA512
adaac864a3c834bd7bd48093d4f84e84117606cf154516292afb79bfad2ebfe80938ee88f2fff1b34fe3e17fe0305ffacd5d7132c8e1c12e0f69df05e182a2d2
-
SSDEEP
49152:aMfQfiZ7q/ruyE3SSY0wYkZvUwORp/sc:aMfT/iiYvUwOd
Malware Config
Extracted
quasar
1.4.0
colt
66.113.31.17:7547
KYS-INF&G^TT*^N
-
encryption_key
70241AEB531B22CC4A2F1CDAD4B909EAB6831EBD
-
install_name
svchost.exe
-
log_directory
colt logs
-
reconnect_delay
100
-
startup_key
svchost.exe
-
subdirectory
rundll32
Targets
-
-
Target
anti-anti-afk.exe
-
Size
1.6MB
-
MD5
65aa3c881c733d7dddb867f4df56c316
-
SHA1
568313bc4a3eaba39da891becee3b752cec87337
-
SHA256
02d23f91859aa28a823d9b082129137836289a5bb11bae498689515a22072b16
-
SHA512
adaac864a3c834bd7bd48093d4f84e84117606cf154516292afb79bfad2ebfe80938ee88f2fff1b34fe3e17fe0305ffacd5d7132c8e1c12e0f69df05e182a2d2
-
SSDEEP
49152:aMfQfiZ7q/ruyE3SSY0wYkZvUwORp/sc:aMfT/iiYvUwOd
-
Quasar family
-
Quasar payload
-
Revengerat family
-
RevengeRat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-